{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3979","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-11-03T18:08:00.683Z","dateReserved":"2021-11-19T00:00:00.000Z","datePublished":"2022-08-25T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2023-10-23T18:06:28.690Z"},"descriptions":[{"lang":"en","value":"A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks."}],"affected":[{"vendor":"n/a","product":"ceph","versions":[{"version":"Not-Known","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024788"},{"url":"https://access.redhat.com/security/cve/CVE-2021-3979"},{"url":"https://tracker.ceph.com/issues/54006"},{"url":"https://github.com/ceph/ceph/pull/44765"},{"url":"https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656"},{"name":"FEDORA-2022-d832fd2f45","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-327 - Use of a Broken or Risky Cryptographic Algorithm","cweId":"CWE-327"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024788","tags":["x_transferred"]},{"url":"https://access.redhat.com/security/cve/CVE-2021-3979","tags":["x_transferred"]},{"url":"https://tracker.ceph.com/issues/54006","tags":["x_transferred"]},{"url":"https://github.com/ceph/ceph/pull/44765","tags":["x_transferred"]},{"url":"https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656","tags":["x_transferred"]},{"name":"FEDORA-2022-d832fd2f45","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/09/msg00025.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T18:08:00.683Z"}}]}}